hero image for Learning Path: Master the OWASP Top 10

Master the OWASP Top 10

OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
Identify the vulnerabilities that make up the OWASP Top 10.
Learn how to prevent common software vulnerabilities.
Find out how to enhance software security.
Try for free

Part of your Lynda.com membership.

3 Hours of expert-created video tutorials
Practice to reinforce what you learned
Certify your achievement
Advance your career
1
course illustration for Learning the OWASP Top 10
2
course illustration for OWASP Top 10: #1 Injection and #2 Broken Authentication
3
course illustration for OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
4
course illustration for OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
5
course illustration for OWASP Top 10: #7 XSS and #8 Insecure Deserialization
6
course illustration for OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

You'll learn application security skills with this expert.